{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:08:10Z","timestamp":1771697290892,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_11","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"129-143","source":"Crossref","is-referenced-by-count":55,"title":["Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA"],"prefix":"10.1007","author":[{"given":"Kouichi","family":"Itoh","sequence":"first","affiliation":[]},{"given":"Tetsuya","family":"Izu","sequence":"additional","affiliation":[]},{"given":"Masahiko","family":"Takenaka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"11_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/3-540-44448-3_38","volume-title":"Asiacrypt 2000","author":"M. Akkar","year":"2000","unstructured":"M. Akkar, R. Bevan, P. Dischamp, and D. Moyart, \u201cPower Analysis, What is Now Possible...\u201d, Asiacrypt 2000, LNCS 1976, pp. 489\u2013502, Springer-Verlag, 2000."},{"key":"11_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/3-540-45664-3_24","volume-title":"PKC 2002","author":"E. Brier","year":"2002","unstructured":"E. Brier, and M. Joye, \u201cWeierstra\u03b2 Elliptic Curves and Side-Channel Attacks\u201d, PKC 2002, LNCS 2274, pp. 335\u2013345, Springer-Verlag, 2002."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, Cambridge University Press, 1999.","DOI":"10.1017\/CBO9781107360211"},{"key":"11_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"CHES\u201999","author":"J. Coron","year":"1999","unstructured":"J. Coron, \u201cResistance against differential power analysis for elliptic curve cryptosystem\u201d, CHES\u201999, LNCS 1717, pp. 292\u2013302, Springer-Verlag, 1999."},{"key":"11_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/3-540-44709-1_25","volume-title":"CHES2001","author":"C. Clavier","year":"2001","unstructured":"C. Clavier, and M. Joye, \u201cUniversal exponentiation algorithm-A first step towards provable SPA-resistance-\u201d, CHES2001, LNCS 2162, pp. 300\u2013308, Springer-Verlag, 2001."},{"key":"11_CR6","unstructured":"W. Fischer, C. Giraud, E. Knudsen, and J.P. Seifert, \u201cParallel Scalar Multiplication on General Elliptic Curves over Fp Hedged Against Non-Differential Side-Channel Attacks\u201d, Cryptology ePrint Archiver, 2002\/007, IACR. Available from \n                    http:\/\/www.iacr.org\/"},{"key":"11_CR7","unstructured":"IEEE P1363, Standard Specifications for Public-Key Cryptography, 2000."},{"key":"11_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/3-540-45664-3_20","volume-title":"PKC 2002","author":"T. Izu","year":"2002","unstructured":"T. Izu, and T. Takagi, \u201cA Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks\u201d, PKC 2002, LNCS 2274, pp. 280\u2013296, Springer-Verlag, 2002."},{"key":"11_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/3-540-44709-1_31","volume-title":"CHES2001","author":"M. Joye","year":"2001","unstructured":"M. Joye, and C. Tymen, \u201cProtections against differential analysis for elliptic curve cryptography\u201d, CHES2001, LNCS 2162, pp. 377\u2013390, Springer-Verlag, 2001."},{"key":"11_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Crypto\u201996","author":"C. Kocher","year":"1996","unstructured":"C. Kocher, \u201cTiming attacks on Implementations of Diffie-Hellman, RSA, DSS, and other systems\u201d, Crypto\u201996, LNCS 1109, pp. 104\u2013113, Springer-Verlag, 1996."},{"key":"11_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Crypto\u201999","author":"C. Kocher","year":"1999","unstructured":"C. Kocher, J. Jaffe, and B. Jun, \u201cDifferential power analysis\u201d, Crypto\u201999, LNCS 1666, pp. 388\u2013397, Springer-Verlag, 1999."},{"key":"11_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"CHES\u201999","author":"T.S. Messerges","year":"1999","unstructured":"T.S. Messerges, E.A. Dabbish, and R.H. Sloan, \u201cPower Analysis Attacks of Modular Exponentiation in Smartcards\u201d, CHES\u201999, LNCS 1717, pp. 144\u2013157, Springer-Verlag, 1999."},{"key":"11_CR13","unstructured":"T.S. Messerges, E.A. Dabbish, and R.H. Sloan, \u201cInvestigations of Power Analysis Attacks on Smartcards,\u201d preprint, USENIX Workshop on Smartcard Technology, 1999."},{"key":"11_CR14","doi-asserted-by":"publisher","first-page":"243","DOI":"10.2307\/2007888","volume":"48","author":"P. Montgomery","year":"1987","unstructured":"P. Montgomery, \u201cSpeeding the Pollard and elliptic curve methods for factorizations\u201d, Mathematics of Computation, vol.48, pp. 243\u2013264, 1987.","journal-title":"Mathematics of Computation"},{"key":"11_CR15","unstructured":"National Institute of Standards and Technology, Recommended Elliptic Curves for Federal Government Use, in the appendix of FIPS 186-2."},{"key":"11_CR16","series-title":"Lect Notes Comput Sci","first-page":"446","volume-title":"PKC 2000","author":"K. Okeya","year":"2000","unstructured":"K. Okeya, H. Kurumatani, and K. Sakurai, \u201cElliptic curves with the Montgomery form and their cryptographic applications\u201d, PKC 2000, LNCS 1751, pp. 446\u2013465, Springer-Verlag, 2000."},{"key":"11_CR17","series-title":"Lect Notes Comput Sci","first-page":"428","volume-title":"ICISC 2001","author":"K. Okeya","year":"2001","unstructured":"K. Okeya, K. Miyazaki, and K. Sakurai, \u201cA fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks\u201d, ICISC 2001, LNCS 2288, pp. 428\u2013439, Springer-Verlag, 2001."},{"key":"11_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Indocrypt 2000","author":"K. Okeya","year":"2000","unstructured":"K. Okeya, and K. Sakurai, \u201cPower analysis breaks elliptic curve cryptosystem even secure against the timing attack\u201d, Indocrypt 2000, LNCS 1977, pp. 178\u2013190, Springer-Verlag, 2000."},{"key":"11_CR19","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/3-540-44709-1_12","volume-title":"CHES 2001","author":"K. Okeya","year":"2001","unstructured":"K. Okeya, and K. Sakurai, \u201cEfficient elliptic curve cryptosystem from a scalar multiplication algorithm with recovery of the y-coordinate on a Montgomery-form elliptic curve\u201d, CHES 2001, LNCS 2162, pp. 126\u2013141, Springer-Verlag, 2001."},{"key":"11_CR20","unstructured":"Standards for Efficient Cryptography Group (SECG), Specification of Standards for Efficient Cryptography."},{"key":"11_CR21","unstructured":"J. Yajima, K. Itoh, M. Takenaka, and N. Torii, \u201cDPA countermeasure by improving the window method\u201d, to appear in the proceeding of CHES 2002."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T10:02:11Z","timestamp":1550916131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}